The implementation of AttackAI in Ali Tianchi Security Competition Phase One.
☆30Oct 24, 2019Updated 6 years ago
Alternatives and similar repositories for Attack_Face_Recognition
Users that are interested in Attack_Face_Recognition are comparing it to the libraries listed below
Sorting:
- 安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place☆69Dec 9, 2019Updated 6 years ago
- 安全AI挑战者计划第一期-人脸识别对抗 7th 方案☆24Dec 7, 2023Updated 2 years ago
- 阿里天池AI安全挑战第一期人脸识别攻击☆10Jun 26, 2020Updated 5 years ago
- ☆43Jul 27, 2021Updated 4 years ago
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Jul 19, 2018Updated 7 years ago
- ☆43May 21, 2020Updated 5 years ago
- Ali Face attack competition☆13Sep 12, 2019Updated 6 years ago
- The author is lazy, nothing writen.☆29Mar 25, 2023Updated 2 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- An easy approach for the competition "Facial Adversary Examples" in TIANCHI☆34Oct 1, 2019Updated 6 years ago
- Black-Box Adversarial Attack on Public Face Recognition Systems☆416Jul 6, 2021Updated 4 years ago
- Towards Efficient and Effective Adversarial Training, NeurIPS 2021☆17Feb 15, 2022Updated 4 years ago
- ☆42Mar 11, 2022Updated 3 years ago
- Attack-Inspired GAN - unofficial pytorch implementation☆17Jun 10, 2023Updated 2 years ago
- EfficientNet for Deep Face Recognition☆20Jul 9, 2020Updated 5 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆167Apr 30, 2019Updated 6 years ago
- No.2 solution of Tianchi ImageNet Adversarial Attack Challenge.☆42Apr 1, 2024Updated last year
- Empc: Effective Path Prioritization for Symbolic Execution with Path Cover☆35May 11, 2025Updated 9 months ago
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆26Dec 11, 2021Updated 4 years ago
- A pytorch implementation of "Adversarial Examples in the Physical World"☆18Sep 4, 2019Updated 6 years ago
- [CVPR 2022] The official implementation of our CVPR 2022 paper "Protecting Facial Privacy: Generating Adversarial Identity Masks via Styl…☆92May 10, 2023Updated 2 years ago
- ☆23May 7, 2024Updated last year
- AdvHat: Real-world adversarial attack on ArcFace Face ID system☆337Feb 18, 2021Updated 5 years ago
- Attack classification models with transferability, black-box attack; unrestricted adversarial attacks on imagenet, CVPR2021 安全AI挑战者计划第六期:…☆51Jun 18, 2021Updated 4 years ago
- ☆62Aug 31, 2021Updated 4 years ago
- ☆25Aug 27, 2021Updated 4 years ago
- Image-to-Image Translation in PyTorch☆27Jan 23, 2020Updated 6 years ago
- Explainable Face Recognition ECCV 2020 Paper code and dataset repository☆65Apr 28, 2021Updated 4 years ago
- Defending Against Physically Realizable Attacks on Image Classification☆34Jun 17, 2022Updated 3 years ago
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆61Mar 9, 2019Updated 6 years ago
- ☆31Jun 22, 2021Updated 4 years ago
- Adversarial Generative Network (AGN) implementation in PyTorch☆33Feb 3, 2021Updated 5 years ago
- ☆11Oct 22, 2017Updated 8 years ago
- Code for our NeurIPS 2020 paper Practical No-box Adversarial Attacks against DNNs.☆34Dec 5, 2020Updated 5 years ago
- A Neural Algorithm of Artistic Style☆29Feb 5, 2016Updated 10 years ago
- A targeted adversarial attack method, which won the NIPS 2017 targeted adversarial attacks competition☆134May 29, 2018Updated 7 years ago
- A Kivy tutorial for PyOhio 2013☆14Apr 30, 2014Updated 11 years ago
- Duel_DDQN (Dueling Network Architectures + Double DQN) using Keras☆31Jun 26, 2016Updated 9 years ago
- CLIP-based Adaptive Graph Attention Network for Large-Scale Unsupervised Multi-modal Hashing Retrieval☆10Mar 18, 2024Updated last year